
Abstract
Read this article on how SHA works. Pay close attention to section 1.5, which compares various SHA variants.
SHA stands for "secure hash algorithm". The four SHA algorithms are structured differently and are named SHA-0, SHA- 1, SHA-2, and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms, but has a more conservative design.SHA appears to provide greater resistance to attacks, supporting the NSA's assertion that the change increased the security. This is a review paper which includes the comparisons between different secure hashing algorithms.
Keywords: SHA-1, SHA-2, SHA-512, message digest, data integrity, message authentication
Source: Priyanka Vadhera, Bhumika Lall, https://www.ijsr.net/archive/v3i6/MDIwMTQxOA==.pdf
This work is licensed under a Creative Commons Attribution 4.0 License.